Virtualization, Storage, Python, Linux/Unix and some useful stuff!

Linux interface card can get lost after a restore operation using netbackup. If you can’t restore your interfaces, and you end up adding new ones, their MAC address will be different from the old interfaces you had and they will get a different name. I was in a situation where I have to restore a

Solaris installation guide will be the first in a series of tutorials designed to build an Oracle Solaris environment where we can discuss and learn step by step. This install will be based on Solaris 11.3. The final goal will be to discuss more advanced topic like Oracle solaris cluster, network virtualization, patch management and

We saw in my previous article that zfs snapshot is a read-only copy of a dataset which can be used as a backup mechanism to rollback the system to it’s previous state, this can be useful before application upgrade or patching. The other feature that is related to zfs snapshot is the zfs clone, which

Using ZFS encryption is straightforward, we can protect our file system using a passphrase which can be specified during the file system mount operation or using a key file (wrapping key) that allow the file system to be mounted automatically. Let’s quickly review some advantage and requirement for encrypted zfs file system. Advantages: Strong encryption:

ZFS file system offer many feature that can help us during our day to day administration tasks, one of this feature is the zfs snapshot which can be used for backup purpose including full and incremental backup or rolling back a system to a previous state. ZFS snapshot can be created quickly and they consume nothing,